Search dblp for Publications

export results for "toc:db/journals/compsec/compsec10.bht:"

 download as .bib file

@article{DBLP:journals/compsec/Allen91,
  author       = {R. J. Allen},
  title        = {Trusted {ORACLE} - multilevel secure data management for military
                  computing},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {271--275},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90044-E},
  doi          = {10.1016/0167-4048(91)90044-E},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Allen91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Banks91,
  author       = {Simon Banks},
  title        = {Understanding IBM's {CICS} systems to improve security},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {205--212},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90035-C},
  doi          = {10.1016/0167-4048(91)90035-C},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Banks91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Baskerville91,
  author       = {Richard L. Baskerville},
  title        = {Risk analysis as a source of professional knowledge},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {8},
  pages        = {749--764},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90094-T},
  doi          = {10.1016/0167-4048(91)90094-T},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Baskerville91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Bologna91,
  author       = {Jack Bologna},
  title        = {A framework for the ethical analysis of information technologies},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {303--307},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90105-M},
  doi          = {10.1016/0167-4048(91)90105-M},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bologna91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Carr91,
  author       = {J. Carr},
  title        = {Electronic data interchange - security risk or not?},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {69--72},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90057-K},
  doi          = {10.1016/0167-4048(91)90057-K},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Carr91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cohen91,
  author       = {Frederick B. Cohen},
  title        = {A cost analysis of typical computer viruses and defenses},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {239--250},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90040-K},
  doi          = {10.1016/0167-4048(91)90040-K},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Cohen91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cohen91a,
  author       = {Frederick B. Cohen},
  title        = {A note on high-integrity {PC} bootstrapping},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {6},
  pages        = {535--539},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90079-S},
  doi          = {10.1016/0167-4048(91)90079-S},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Cohen91a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cohen91b,
  author       = {Frederick B. Cohen},
  title        = {A DOS-based \emph{POset} implementation},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {6},
  pages        = {541--551},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90080-W},
  doi          = {10.1016/0167-4048(91)90080-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Cohen91b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CoomaraswamyKM91,
  author       = {Gnanesh Coomaraswamy and
                  Srikanta P. R. Kumar and
                  Michel E. Marhic},
  title        = {Fiber-optic {LAN/WAN} systems to support confidential communication},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {8},
  pages        = {765--776},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90095-U},
  doi          = {10.1016/0167-4048(91)90095-U},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CoomaraswamyKM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Domingo-Ferrer91,
  author       = {Josep Domingo{-}Ferrer},
  title        = {Algorithm- sequenced access control},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {7},
  pages        = {639--652},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90122-T},
  doi          = {10.1016/0167-4048(91)90122-T},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Domingo-Ferrer91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Evans91,
  author       = {Paul Evans},
  title        = {Computer fraud - The situation, detection and training},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {325--327},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90107-O},
  doi          = {10.1016/0167-4048(91)90107-O},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Evans91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Fak91,
  author       = {Viiveke F{\aa}k},
  title        = {Computer verification of human users' identity: {A} theoretical model
                  and some evaluation criteria},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {7},
  pages        = {626--636},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90120-3},
  doi          = {10.1016/0167-4048(91)90120-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Fak91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Farquhar91,
  author       = {Bill Farquhar},
  title        = {One approach to risk assessment},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {21--23},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90051-E},
  doi          = {10.1016/0167-4048(91)90051-E},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Farquhar91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GoyalS91,
  author       = {M. L. Goyal and
                  G. V. Singh},
  title        = {Access control in distributed heterogeneous database management systems},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {7},
  pages        = {661--669},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90124-V},
  doi          = {10.1016/0167-4048(91)90124-V},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GoyalS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GritzalisTKK91,
  author       = {Dimitris Gritzalis and
                  A. Tomaras and
                  Sokratis K. Katsikas and
                  J. Keklikoglou},
  title        = {Data security in medical information systems: The Greek case},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {141--159},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90008-2},
  doi          = {10.1016/0167-4048(91)90008-2},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GritzalisTKK91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland91,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {4--16},
  year         = {1991},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland91a,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {92--100},
  year         = {1991},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland91a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland91b,
  author       = {Harold Joseph Highland},
  title        = {A non-mathematical view of encryption},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {184--188},
  year         = {1991},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland91b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland91c,
  author       = {Harold Joseph Highland},
  title        = {Evaluating an encryption package},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {189--190},
  year         = {1991},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland91c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland91d,
  author       = {Harold Joseph Highland},
  title        = {Computers under attack},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {190--191},
  year         = {1991},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland91d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland91e,
  author       = {Harold Joseph Highland},
  title        = {Microcomputer utilities},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {191--195},
  year         = {1991},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland91e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland91f,
  author       = {Harold Joseph Highland},
  title        = {{NTIS} volumes of interest},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {195--198},
  year         = {1991},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland91f.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland91g,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {5},
  pages        = {384--397},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90064-K},
  doi          = {10.1016/0167-4048(91)90064-K},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland91g.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland91h,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {6},
  pages        = {486--495},
  year         = {1991},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland91h.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland91i,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {7},
  pages        = {586--600},
  year         = {1991},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland91i.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Highland91j,
  author       = {Harold Joseph Highland},
  title        = {Random bits {\&} bytes},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {8},
  pages        = {690--699},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90088-U},
  doi          = {10.1016/0167-4048(91)90088-U},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Highland91j.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hiles91,
  author       = {Andrew Hiles},
  title        = {Computer fire risks},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {299--302},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90104-L},
  doi          = {10.1016/0167-4048(91)90104-L},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hiles91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JanCW91,
  author       = {Jinn{-}Ke Jan and
                  Chin{-}Chen Chang and
                  S. J. Wang},
  title        = {A dynamic key-lock-pair access control scheme},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {129--139},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90007-Z},
  doi          = {10.1016/0167-4048(91)90007-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JanCW91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kowalski91,
  author       = {Stewart Kowalski},
  title        = {The ABCs and Es of national computer security policies},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {213--216},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90036-D},
  doi          = {10.1016/0167-4048(91)90036-D},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kowalski91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kowalski91a,
  author       = {Stewart Kowalski},
  title        = {Cybernetic analysis of national computer security},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {217--227},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90037-E},
  doi          = {10.1016/0167-4048(91)90037-E},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kowalski91a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kowalski91b,
  author       = {Stewart Kowalski},
  title        = {Cybernetic analysis of the 12th {U.S.} National Computer Security
                  Conference},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {228--235},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90038-F},
  doi          = {10.1016/0167-4048(91)90038-F},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kowalski91b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kruys91,
  author       = {Jan Kruys},
  title        = {Progress in secure distributed systems},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {5},
  pages        = {429--441},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90069-P},
  doi          = {10.1016/0167-4048(91)90069-P},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kruys91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Laferriere91,
  author       = {Claude Laferriere},
  title        = {Predicate based polyinstantiation in multi-level secure {DBMS}},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {41--49},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90055-I},
  doi          = {10.1016/0167-4048(91)90055-I},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Laferriere91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LaurichesseB91,
  author       = {Denis Laurichesse and
                  Laurent Blain},
  title        = {Optimized implementation of {RSA} cryptosystem},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {263--267},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90042-C},
  doi          = {10.1016/0167-4048(91)90042-C},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LaurichesseB91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Lynch91,
  author       = {Paul Lynch},
  title        = {Beyond {RACF:} Extending user authentication controls},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {8},
  pages        = {711--722},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90090-Z},
  doi          = {10.1016/0167-4048(91)90090-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Lynch91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Menkus91,
  author       = {Belden Menkus},
  title        = {How to begin dealing with computer security},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {199--203},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90034-B},
  doi          = {10.1016/0167-4048(91)90034-B},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Menkus91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Menkus91a,
  author       = {Belden Menkus},
  title        = {"Control" is fundamental to successful information security},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {293--297},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90103-K},
  doi          = {10.1016/0167-4048(91)90103-K},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Menkus91a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Menkus91b,
  author       = {Belden Menkus},
  title        = {"Hackers": Know the adversary},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {5},
  pages        = {405--409},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90066-M},
  doi          = {10.1016/0167-4048(91)90066-M},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Menkus91b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MitchellV91,
  author       = {Chris J. Mitchell and
                  Vijay Varadharajan},
  title        = {Modified forms of cipher block chaining},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {37--40},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90054-H},
  doi          = {10.1016/0167-4048(91)90054-H},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MitchellV91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NurmiSS91,
  author       = {Hannu Nurmi and
                  Arto Salomaa and
                  Lila Santean},
  title        = {Secret ballot elections in computer networks},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {6},
  pages        = {553--560},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90081-N},
  doi          = {10.1016/0167-4048(91)90081-N},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NurmiSS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OShea91,
  author       = {G. F. G. O'Shea},
  title        = {Operating system integrity},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {5},
  pages        = {443--465},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90070-T},
  doi          = {10.1016/0167-4048(91)90070-T},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OShea91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Paans91,
  author       = {Ronald Paans},
  title        = {With {MVS/ESA} security labels towards {B1}},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {309--324},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90106-N},
  doi          = {10.1016/0167-4048(91)90106-N},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Paans91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PaansL91,
  author       = {Ronald Paans and
                  Hans de Lange},
  title        = {Auditing the {SNA/SNI} environment},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {251--261},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90041-B},
  doi          = {10.1016/0167-4048(91)90041-B},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PaansL91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Peach91,
  author       = {S. Peach},
  title        = {Disaster recovery: An unnecessary cost burden or an essential feature
                  of any {DP} installation?},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {6},
  pages        = {565--568},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90084-Q},
  doi          = {10.1016/0167-4048(91)90084-Q},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Peach91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Pfleeger91,
  author       = {Shari Lawrence Pfleeger},
  title        = {A framework for security requirements},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {6},
  pages        = {515--523},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90076-P},
  doi          = {10.1016/0167-4048(91)90076-P},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Pfleeger91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PostK91,
  author       = {Gerald V. Post and
                  Karen{-}Ann Kievit},
  title        = {Accessibility vs. security: {A} look at the demand for computer security},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {331--344},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90109-Q},
  doi          = {10.1016/0167-4048(91)90109-Q},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PostK91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PottasS91,
  author       = {Dalenca Pottas and
                  Sebastiaan H. von Solms},
  title        = {A computerized management reporting aid for a mainframe security system},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {7},
  pages        = {653--660},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90123-U},
  doi          = {10.1016/0167-4048(91)90123-U},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PottasS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Press91,
  author       = {Jim Press},
  title        = {Secure transfer of identity and privilege attributes in an open systems
                  environment},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {117--127},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90006-Y},
  doi          = {10.1016/0167-4048(91)90006-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Press91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Preston91,
  author       = {Charles Preston},
  title        = {Creating a corporate virus plan},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {8},
  pages        = {701--710},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90089-V},
  doi          = {10.1016/0167-4048(91)90089-V},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Preston91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Rihaczek91,
  author       = {Karl Rihaczek},
  title        = {The harmonized {ITSEC} evaluation criteria},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {101--110},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90003-V},
  doi          = {10.1016/0167-4048(91)90003-V},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Rihaczek91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Robertson91,
  author       = {Bernard Robertson},
  title        = {Electronic mail - Is is safe to use?},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {17--19},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90050-N},
  doi          = {10.1016/0167-4048(91)90050-N},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Robertson91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RosenthalH91,
  author       = {Paul Herbert Rosenthal and
                  Barry Himel},
  title        = {Business resumption planning: Exercising your emergency response teams},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {6},
  pages        = {497--514},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90075-O},
  doi          = {10.1016/0167-4048(91)90075-O},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RosenthalH91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RushinekR91,
  author       = {Avi Rushinek and
                  Sara F. Rushinek},
  title        = {Data encryption features for computer hardware and software profitability:
                  {I/O} ports, expansion slots, algorithms, cyphers and security},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {345--357},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90110-Y},
  doi          = {10.1016/0167-4048(91)90110-Y},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RushinekR91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SandhuJ91,
  author       = {Ravi S. Sandhu and
                  Sushil Jajodia},
  title        = {Integrity principles and mechanisms in database management systems},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {5},
  pages        = {413--427},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90068-O},
  doi          = {10.1016/0167-4048(91)90068-O},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SandhuJ91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schramm91,
  author       = {Christof Schramm},
  title        = {Computing centers undermine {MVS} security},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {359--370},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90111-P},
  doi          = {10.1016/0167-4048(91)90111-P},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Schramm91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Sherizen91,
  author       = {Sanford Sherizen},
  title        = {European unification '92 impacts on information security},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {7},
  pages        = {601--610},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90117-V},
  doi          = {10.1016/0167-4048(91)90117-V},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Sherizen91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Steinke91,
  author       = {Gerhard Steinke},
  title        = {Design aspects of access control in a knowledge base system},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {7},
  pages        = {612--625},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90119-X},
  doi          = {10.1016/0167-4048(91)90119-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Steinke91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TanakaO91,
  author       = {Kazue Tanaka and
                  Eiji Okamoto},
  title        = {Key distribution system for mail systems using ID-related information
                  directory},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {25--33},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90052-F},
  doi          = {10.1016/0167-4048(91)90052-F},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TanakaO91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Thimbleby91,
  author       = {Harold W. Thimbleby},
  title        = {Can viruses ever be useful?},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {111--114},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90004-W},
  doi          = {10.1016/0167-4048(91)90004-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Thimbleby91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Thuraisingham91,
  author       = {Bhavani Thuraisingham},
  title        = {Multilevel security issues in distributed database management systems
                  {II}},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {8},
  pages        = {727--747},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90093-S},
  doi          = {10.1016/0167-4048(91)90093-S},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Thuraisingham91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VaradharajanB91,
  author       = {Vijay Varadharajan and
                  Stewart Black},
  title        = {Multilevel security in a distributed object-oriented system},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {1},
  pages        = {51--68},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90056-J},
  doi          = {10.1016/0167-4048(91)90056-J},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VaradharajanB91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wood91,
  author       = {Charles Cresson Wood},
  title        = {Using information security to achieve competitive advantage},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {5},
  pages        = {399--404},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90065-L},
  doi          = {10.1016/0167-4048(91)90065-L},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wood91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wood91a,
  author       = {Charles Cresson Wood},
  title        = {Burning computer security, privacy, and freedom issues},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {6},
  pages        = {524--532},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90077-Q},
  doi          = {10.1016/0167-4048(91)90077-Q},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wood91a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics